chore: add code to handle opendid and single sign-on
This commit is contained in:
parent
42dc0ff7a3
commit
1f5c4bad4f
@ -30,6 +30,8 @@ pub struct OpenidClaims {
|
|||||||
pub name: String,
|
pub name: String,
|
||||||
pub owner: String,
|
pub owner: String,
|
||||||
pub email: String,
|
pub email: String,
|
||||||
|
#[serde(default = "default_empty", rename(deserialize = "signupApplication"))]
|
||||||
|
pub signup_application: String,
|
||||||
// exp: i64,
|
// exp: i64,
|
||||||
}
|
}
|
||||||
#[derive(Default,Deserialize,Serialize,Debug,Clone)]
|
#[derive(Default,Deserialize,Serialize,Debug,Clone)]
|
||||||
@ -67,6 +69,7 @@ pub struct OpenidConf {
|
|||||||
pub certificate: String,
|
pub certificate: String,
|
||||||
pub org_name: String,
|
pub org_name: String,
|
||||||
pub app_name: String,
|
pub app_name: String,
|
||||||
|
pub signup_application: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct OpenidCli {
|
pub struct OpenidCli {
|
||||||
|
@ -2,67 +2,50 @@ use serde::{Deserialize,Serialize};
|
|||||||
use sqlx::Row;
|
use sqlx::Row;
|
||||||
use futures::TryStreamExt;
|
use futures::TryStreamExt;
|
||||||
use anyhow::{anyhow,Context, Result};
|
use anyhow::{anyhow,Context, Result};
|
||||||
use std::{
|
use std::fmt;
|
||||||
fmt,
|
|
||||||
collections::HashMap,
|
|
||||||
};
|
|
||||||
// use std::{
|
|
||||||
// // sync::Arc,
|
|
||||||
// fmt::Debug,
|
|
||||||
// // io::Write,
|
|
||||||
// // fs,
|
|
||||||
// // path::{Path, PathBuf},
|
|
||||||
// // io::{Error, ErrorKind},
|
|
||||||
// collections::HashMap,
|
|
||||||
// };
|
|
||||||
// use async_session::{MemoryStore, Session, SessionStore};
|
|
||||||
//use tiitls_utils::logs::file;
|
|
||||||
// use uuid::Uuid;
|
|
||||||
// SID_UI_FILE,
|
|
||||||
// UI_SETTINGS_FILE,
|
|
||||||
// SidSettings,
|
|
||||||
// Config as SessionsConfig,
|
|
||||||
use std::num::ParseIntError;
|
use std::num::ParseIntError;
|
||||||
use crate::{
|
use crate::{
|
||||||
users::{
|
users::{
|
||||||
entries::{Entries,Entry},
|
entries::{Entries,Entry},
|
||||||
UserData,
|
|
||||||
UserStore,
|
UserStore,
|
||||||
UserStatus,
|
|
||||||
},
|
},
|
||||||
USERS_TABLENAME,
|
OPENID_USERS_TABLENAME,
|
||||||
tools::str_date_from_timestamp,
|
tools::str_date_from_timestamp,
|
||||||
};
|
};
|
||||||
|
|
||||||
const DISPLAY_SEPARATOR: &str = "=";
|
const DISPLAY_SEPARATOR: &str = "=";
|
||||||
|
|
||||||
fn default_user_status() -> UserStatus {
|
|
||||||
UserStatus::default()
|
|
||||||
}
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, PartialEq, PartialOrd, Serialize, Deserialize,Default)]
|
#[derive(Debug, Clone, PartialEq, PartialOrd, Serialize, Deserialize,Default)]
|
||||||
pub struct User {
|
pub struct OpenidUser {
|
||||||
pub id: i64,
|
pub id: i64,
|
||||||
pub name: String,
|
pub application: String,
|
||||||
pub fullname: String,
|
pub appkey: String,
|
||||||
pub email: String,
|
pub name: String,
|
||||||
|
pub userid: i64,
|
||||||
pub description: String,
|
pub description: String,
|
||||||
pub password: String,
|
|
||||||
pub otp_enabled: bool,
|
|
||||||
pub otp_verified: bool,
|
|
||||||
pub otp_base32: String,
|
|
||||||
pub otp_auth_url: String,
|
|
||||||
pub otp_defs: String,
|
|
||||||
pub roles: String,
|
|
||||||
pub created: String,
|
pub created: String,
|
||||||
pub lastaccess: String,
|
pub lastaccess: String,
|
||||||
#[serde(default = "default_user_status")]
|
|
||||||
pub status: UserStatus,
|
|
||||||
pub items: String,
|
|
||||||
pub isadmin: bool,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
impl fmt::Display for User {
|
fn default_empty() -> String {
|
||||||
|
"".to_string()
|
||||||
|
}
|
||||||
|
#[derive(Default,Deserialize,Serialize,Debug,Clone)]
|
||||||
|
pub struct OpenidUserData {
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub id: String,
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub name: String,
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub application: String,
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub appkey: String,
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub userid: String,
|
||||||
|
#[serde(default = "default_empty")]
|
||||||
|
pub description: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl fmt::Display for OpenidUser {
|
||||||
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||||||
// Write strictly the first element into the supplied output
|
// Write strictly the first element into the supplied output
|
||||||
// stream: `f`. Returns `fmt::Result` which indicates whether the
|
// stream: `f`. Returns `fmt::Result` which indicates whether the
|
||||||
@ -72,108 +55,73 @@ impl fmt::Display for User {
|
|||||||
let content = format!(
|
let content = format!(
|
||||||
"ID{} {}
|
"ID{} {}
|
||||||
Name{} {}
|
Name{} {}
|
||||||
FullName{} {}
|
Application{} {}
|
||||||
|
AppKey {} {}
|
||||||
|
UserId{} {}
|
||||||
Description{} {}
|
Description{} {}
|
||||||
Email{} {}
|
|
||||||
Password{} {}
|
|
||||||
otp_enabled{} {}
|
|
||||||
otp_verified{} {}
|
|
||||||
otp_base32{} {}
|
|
||||||
otp_auth_url{} {}
|
|
||||||
otp_defs{} {}
|
|
||||||
Roles{} {}
|
|
||||||
Created{} {}
|
Created{} {}
|
||||||
Last access{} {}
|
Last access{} {}",
|
||||||
Status{} {}
|
|
||||||
Items{} {}
|
|
||||||
IsAdmin{} {}",
|
|
||||||
sep, self.id,
|
sep, self.id,
|
||||||
sep, self.name, sep, self.fullname,
|
sep, self.name,
|
||||||
|
sep, self.application,
|
||||||
|
sep, self.appkey,
|
||||||
|
sep, self.userid,
|
||||||
sep, self.description,
|
sep, self.description,
|
||||||
sep, self.email,
|
sep, self.created,
|
||||||
sep, self.password,
|
sep, self.lastaccess,
|
||||||
sep, self.otp_enabled,
|
|
||||||
sep, self.otp_verified,
|
|
||||||
sep, self.otp_base32,
|
|
||||||
sep, self.otp_auth_url,
|
|
||||||
sep, self.otp_defs,
|
|
||||||
sep, self.roles,
|
|
||||||
sep, self.created, sep, self.lastaccess,
|
|
||||||
sep, self.status,
|
|
||||||
sep, self.items,
|
|
||||||
sep, self.isadmin
|
|
||||||
);
|
);
|
||||||
write!(f, "{}", content)
|
write!(f, "{}", content)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Entry for User {
|
impl Entry for OpenidUser {
|
||||||
fn from_line(line: &str) -> Result<User, ParseIntError> {
|
fn from_line(line: &str) -> Result<OpenidUser, ParseIntError> {
|
||||||
let parts: Vec<&str> = line.split(":").map(|part| part.trim()).collect();
|
let parts: Vec<&str> = line.split(":").map(|part| part.trim()).collect();
|
||||||
Ok(User {
|
Ok(OpenidUser {
|
||||||
id: parts[0].to_string().parse::<i64>().unwrap_or_default(),
|
id: parts[0].to_string().parse::<i64>().unwrap_or_default(),
|
||||||
name: parts[1].to_string(),
|
name: parts[1].to_string(),
|
||||||
fullname: parts[2].to_string(),
|
application: parts[2].to_string(),
|
||||||
description: parts[3].to_string(),
|
appkey: parts[3].to_string(),
|
||||||
email: parts[4].to_string(),
|
description: parts[4].to_string(),
|
||||||
password: parts[5].to_string(),
|
userid: parts[5].to_string().parse::<i64>().unwrap_or_default(),
|
||||||
otp_enabled: if parts[6] == "TRUE" { true } else { false},
|
created: parts[6].to_string(),
|
||||||
otp_verified: if parts[7] == "TRUE" { true } else { false},
|
lastaccess: parts[7].to_string(),
|
||||||
otp_base32: parts[8].to_string(),
|
|
||||||
otp_auth_url: parts[9].to_string(),
|
|
||||||
otp_defs: parts[10].to_string(),
|
|
||||||
roles: parts[11].to_string(),
|
|
||||||
created: parts[12].to_string(),
|
|
||||||
lastaccess: parts[13].to_string(),
|
|
||||||
status: UserStatus::from_str(&parts[14].to_string()),
|
|
||||||
items: parts[15].to_string(),
|
|
||||||
isadmin: if parts[16] == "TRUE" { true } else { false},
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl User {
|
impl OpenidUser {
|
||||||
pub async fn add(self, store: &UserStore) -> Result<i64> {
|
pub async fn add(self, store: &UserStore) -> Result<i64> {
|
||||||
|
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
let query_result = sqlx::query(
|
let query_result = sqlx::query(
|
||||||
format!("INSERT INTO {} (
|
format!("INSERT INTO {} (
|
||||||
name, fullname, email, description, password, otp_enabled, otp_verified,
|
name, application, appkey,
|
||||||
otp_base32,
|
userid,
|
||||||
otp_auth_url,
|
description,
|
||||||
otp_defs,
|
created, lastaccess
|
||||||
roles, created, lastaccess, status, items, isadmin
|
) VALUES ( ?, ?, ?, ?, ?, ?, ?)", OPENID_USERS_TABLENAME).as_str()
|
||||||
) VALUES ( ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)", USERS_TABLENAME).as_str()
|
|
||||||
)
|
)
|
||||||
.bind(self.name)
|
.bind(self.name)
|
||||||
.bind(self.fullname)
|
.bind(self.application)
|
||||||
.bind(self.email)
|
.bind(self.appkey)
|
||||||
|
.bind(self.userid)
|
||||||
.bind(self.description)
|
.bind(self.description)
|
||||||
.bind(self.password)
|
|
||||||
.bind(self.otp_enabled)
|
|
||||||
.bind(self.otp_verified)
|
|
||||||
.bind(self.otp_base32)
|
|
||||||
.bind(self.otp_auth_url)
|
|
||||||
.bind(self.otp_defs)
|
|
||||||
.bind(self.roles)
|
|
||||||
.bind(self.created)
|
.bind(self.created)
|
||||||
.bind(self.lastaccess)
|
.bind(self.lastaccess)
|
||||||
.bind(format!("{}",self.status))
|
|
||||||
.bind(self.items)
|
|
||||||
.bind(self.isadmin)
|
|
||||||
.execute(pool).await?;
|
.execute(pool).await?;
|
||||||
Ok(query_result.last_insert_id().unwrap_or_default())
|
Ok(query_result.last_insert_id().unwrap_or_default())
|
||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
// use itertools::Itertools;
|
// use itertools::Itertools;
|
||||||
// let entries: Vec<String> = concat(vec![
|
// let entries: Vec<String> = concat(vec![
|
||||||
// Entries::new(Path::new(&file_path)).map(|user: User|{
|
// Entries::new(Path::new(&file_path)).map(|user: OpenidUser|{
|
||||||
// user.line_format()
|
// user.line_format()
|
||||||
// }).collect(),
|
// }).collect(),
|
||||||
// vec![ self.line_format()]
|
// vec![ self.line_format()]
|
||||||
// ]);
|
// ]);
|
||||||
// Entries::<User>::write(Path::new(&file_path), &entries);
|
// Entries::<OpenidUser>::write(Path::new(&file_path), &entries);
|
||||||
let all: Vec<User> = Entries::new(&file_path).collect();
|
let all: Vec<OpenidUser> = Entries::new(&file_path).collect();
|
||||||
let id = if all.len() > 0 {
|
let id = if all.len() > 0 {
|
||||||
all[all.len()-1].id + 1
|
all[all.len()-1].id + 1
|
||||||
} else {
|
} else {
|
||||||
@ -181,32 +129,32 @@ impl User {
|
|||||||
};
|
};
|
||||||
let mut new_user = self.to_owned();
|
let mut new_user = self.to_owned();
|
||||||
new_user.id = id;
|
new_user.id = id;
|
||||||
let entries: Entries<User> = Entries::new(&file_path);
|
let entries: Entries<OpenidUser> = Entries::new(&file_path);
|
||||||
match entries.append(new_user.line_format()) {
|
match entries.append(new_user.line_format()) {
|
||||||
Ok(_) => Ok(id),
|
Ok(_) => Ok(id),
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
println!("Error add item to file: {}",e);
|
println!("Error add item to file: {}",e);
|
||||||
Err(anyhow!("No data added")).context("User add")
|
Err(anyhow!("No data added")).context("OpenidUser add")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
#[allow(dead_code)]
|
||||||
pub async fn select(field: &str, value: &str, human: bool, store: &UserStore) -> Result<Self> {
|
pub async fn select(field: &str, value: &str, human: bool, store: &UserStore) -> Result<Self> {
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
let query_str = format!("SELECT * FROM {} WHERE {} = ? ", USERS_TABLENAME, field);
|
let query_str = format!("SELECT * FROM {} WHERE '{}' = ?", OPENID_USERS_TABLENAME, field);
|
||||||
|
dbg!(&query_str);
|
||||||
let mut stream = sqlx::query(
|
let mut stream = sqlx::query(
|
||||||
&query_str
|
&query_str
|
||||||
)
|
)
|
||||||
.bind(value)
|
.bind(value)
|
||||||
//.map(|row: PgRow| {
|
//.map(|row: PgRow| {
|
||||||
// map the row into a user-defined domain type
|
// map the row into a user-defined domain type
|
||||||
//})
|
//})
|
||||||
.fetch(pool);
|
.fetch(pool);
|
||||||
if let Some(row) = stream.try_next().await? {
|
if let Some(row) = stream.try_next().await? {
|
||||||
let str_status: String = row.try_get("status")?;
|
|
||||||
let status = UserStatus::from_str(&str_status);
|
|
||||||
let created = if human {
|
let created = if human {
|
||||||
let created: String = row.try_get("created")?;
|
let created: String = row.try_get("created")?;
|
||||||
str_date_from_timestamp(&created)
|
str_date_from_timestamp(&created)
|
||||||
@ -222,49 +170,92 @@ impl User {
|
|||||||
Ok(Self{
|
Ok(Self{
|
||||||
id: row.try_get("id")?,
|
id: row.try_get("id")?,
|
||||||
name: row.try_get("name")?,
|
name: row.try_get("name")?,
|
||||||
fullname: row.try_get("fullname")?,
|
application: row.try_get("application")?,
|
||||||
email: row.try_get("email")?,
|
appkey: row.try_get("appkey")?,
|
||||||
|
userid: row.try_get("userid")?,
|
||||||
description: row.try_get("description")?,
|
description: row.try_get("description")?,
|
||||||
password: row.try_get("password")?,
|
|
||||||
otp_enabled: row.try_get("otp_enabled")?,
|
|
||||||
otp_verified: row.try_get("otp_verified")?,
|
|
||||||
otp_base32: row.try_get("otp_base32")?,
|
|
||||||
otp_auth_url: row.try_get("otp_auth_url")?,
|
|
||||||
otp_defs: row.try_get("otp_defs")?,
|
|
||||||
roles: row.try_get("roles")?,
|
|
||||||
created,
|
created,
|
||||||
lastaccess,
|
lastaccess,
|
||||||
status,
|
|
||||||
items: row.try_get("items")?,
|
|
||||||
isadmin: row.try_get("isadmin")?,
|
|
||||||
})
|
})
|
||||||
} else {
|
} else {
|
||||||
Err(anyhow!("No data found")).context("User select")
|
Err(anyhow!("No data found")).context("OpenidUser select")
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
if let Some(user) =
|
if let Some(user) =
|
||||||
Entries::<User>::new(&file_path).find(|it|
|
Entries::<OpenidUser>::new(&file_path).find(|it|
|
||||||
match field {
|
match field {
|
||||||
"id" => it.id == value.parse::<i64>().unwrap_or_default(),
|
"id" => it.id == value.parse::<i64>().unwrap_or_default(),
|
||||||
"name" => it.name == value,
|
"name" => it.name == value,
|
||||||
"fullname" => it.fullname == value,
|
"application" => it.application == value,
|
||||||
"email" => it.email == value,
|
"appkey" => it.appkey == value,
|
||||||
"description" => it.description == value,
|
"userid" => it.userid == value.parse::<i64>().unwrap_or_default(),
|
||||||
"otp_base32" => it.otp_base32 == value,
|
|
||||||
"roles" => it.roles == value,
|
|
||||||
"items" => it.items == value,
|
|
||||||
"isadmin" => match value {
|
|
||||||
"TRUE" => it.isadmin,
|
|
||||||
_ => !it.isadmin,
|
|
||||||
},
|
|
||||||
_ => false,
|
_ => false,
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
Ok(user)
|
Ok(user)
|
||||||
} else {
|
} else {
|
||||||
Err(anyhow!("No data found")).context("User select")
|
Err(anyhow!("No data found")).context("OpenidUser select")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
pub async fn app_select(app: &str , field: &str, value: &str, human: bool, store: &UserStore) -> Result<Self> {
|
||||||
|
match store {
|
||||||
|
UserStore::Sql(pool) => {
|
||||||
|
let query_str = format!("SELECT * FROM {} WHERE application = '{}' AND {} = ?", OPENID_USERS_TABLENAME, app, field);
|
||||||
|
let mut stream = sqlx::query(
|
||||||
|
&query_str
|
||||||
|
)
|
||||||
|
.bind(value)
|
||||||
|
//.map(|row: PgRow| {
|
||||||
|
// map the row into a user-defined domain type
|
||||||
|
//})
|
||||||
|
.fetch(pool);
|
||||||
|
if let Some(row) = stream.try_next().await? {
|
||||||
|
let created = if human {
|
||||||
|
let created: String = row.try_get("created")?;
|
||||||
|
str_date_from_timestamp(&created)
|
||||||
|
} else {
|
||||||
|
row.try_get("created")?
|
||||||
|
};
|
||||||
|
let lastaccess = if human {
|
||||||
|
let lastaccess: String = row.try_get("lastaccess")?;
|
||||||
|
str_date_from_timestamp(&lastaccess)
|
||||||
|
} else {
|
||||||
|
row.try_get("lastaccess")?
|
||||||
|
};
|
||||||
|
Ok(Self{
|
||||||
|
id: row.try_get("id")?,
|
||||||
|
name: row.try_get("name")?,
|
||||||
|
application: row.try_get("application")?,
|
||||||
|
appkey: row.try_get("appkey")?,
|
||||||
|
userid: row.try_get("userid")?,
|
||||||
|
description: row.try_get("description")?,
|
||||||
|
created,
|
||||||
|
lastaccess,
|
||||||
|
})
|
||||||
|
} else {
|
||||||
|
Err(anyhow!("No data found")).context("OpenidUser select")
|
||||||
|
}
|
||||||
|
},
|
||||||
|
UserStore::File(file_path) => {
|
||||||
|
if let Some(user) =
|
||||||
|
Entries::<OpenidUser>::new(&file_path).find(|it|
|
||||||
|
match field {
|
||||||
|
"id" => it.id == value.parse::<i64>().unwrap_or_default(),
|
||||||
|
"name" => it.name == value,
|
||||||
|
"application" => it.application == app,
|
||||||
|
"appkey" => it.application == value,
|
||||||
|
"userid" => it.userid == value.parse::<i64>().unwrap_or_default(),
|
||||||
|
_ => false,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
{
|
||||||
|
Ok(user)
|
||||||
|
} else {
|
||||||
|
Err(anyhow!("No data found")).context("OpenidUser select")
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
@ -273,7 +264,7 @@ impl User {
|
|||||||
pub async fn delete(id: i64, store: &UserStore) -> Result<bool> {
|
pub async fn delete(id: i64, store: &UserStore) -> Result<bool> {
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
let query_str = format!("DELETE FROM {} WHERE id = ?", USERS_TABLENAME);
|
let query_str = format!("DELETE FROM {} WHERE id = ?", OPENID_USERS_TABLENAME);
|
||||||
let query_result = sqlx::query(
|
let query_result = sqlx::query(
|
||||||
&query_str
|
&query_str
|
||||||
)
|
)
|
||||||
@ -283,15 +274,15 @@ impl User {
|
|||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
let new_entries: Vec<String> =
|
let new_entries: Vec<String> =
|
||||||
Entries::<User>::new(&file_path).filter(|it| it.id != id).map(|user|
|
Entries::<OpenidUser>::new(&file_path).filter(|it| it.id != id).map(|user|
|
||||||
user.line_format()
|
user.line_format()
|
||||||
).collect();
|
).collect();
|
||||||
let entries = Entries::<User>::new(&file_path);
|
let entries = Entries::<OpenidUser>::new(&file_path);
|
||||||
match entries.write(&new_entries) {
|
match entries.write(&new_entries) {
|
||||||
Ok(_) => Ok(true),
|
Ok(_) => Ok(true),
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
println!("Error data delete '{}': {}", id, e);
|
println!("Error data delete '{}': {}", id, e);
|
||||||
Err(anyhow!("No data delete").context("User delete"))
|
Err(anyhow!("No data delete").context("OpenidUser delete"))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -300,56 +291,44 @@ impl User {
|
|||||||
pub async fn update(self, store: &UserStore) -> anyhow::Result<bool> {
|
pub async fn update(self, store: &UserStore) -> anyhow::Result<bool> {
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
let query_str = format!("UPDATE {} SET name = ?, fullname = ?,
|
let query_str = format!("UPDATE {} SET name = ?,
|
||||||
email = ?, description = ?, password = ?,
|
application = ?,
|
||||||
otp_enabled = ?, otp_verified = ?,
|
appkey = ?,
|
||||||
otp_base32 = ?, otp_auth_url = ?,
|
userid = ?,
|
||||||
otp_defs = ?,
|
description = ?,
|
||||||
roles = ?,
|
created = ?,
|
||||||
created = ?, lastaccess = ?,
|
lastaccess = ?
|
||||||
status = ?,
|
|
||||||
items = ?,
|
|
||||||
isadmin = ?
|
|
||||||
WHERE id = ? ",
|
WHERE id = ? ",
|
||||||
USERS_TABLENAME
|
OPENID_USERS_TABLENAME
|
||||||
);
|
);
|
||||||
let query_result = sqlx::query(
|
let query_result = sqlx::query(
|
||||||
&query_str
|
&query_str
|
||||||
)
|
)
|
||||||
.bind(self.name)
|
.bind(self.name)
|
||||||
.bind(self.fullname)
|
.bind(self.application)
|
||||||
.bind(self.email)
|
.bind(self.appkey)
|
||||||
|
.bind(self.userid)
|
||||||
.bind(self.description)
|
.bind(self.description)
|
||||||
.bind(self.password)
|
|
||||||
.bind(self.otp_enabled)
|
|
||||||
.bind(self.otp_verified)
|
|
||||||
.bind(self.otp_base32)
|
|
||||||
.bind(self.otp_auth_url)
|
|
||||||
.bind(self.otp_defs)
|
|
||||||
.bind(self.roles)
|
|
||||||
.bind(self.created)
|
.bind(self.created)
|
||||||
.bind(self.lastaccess)
|
.bind(self.lastaccess)
|
||||||
.bind(format!("{}",self.status))
|
|
||||||
.bind(self.items)
|
|
||||||
.bind(self.isadmin)
|
|
||||||
.bind(self.id)
|
.bind(self.id)
|
||||||
.execute(pool).await?;
|
.execute(pool).await?;
|
||||||
Ok(query_result.rows_affected() > 0)
|
Ok(query_result.rows_affected() > 0)
|
||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
let new_entries: Vec<String> = Entries::new(&file_path).map(|user: User|{
|
let new_entries: Vec<String> = Entries::new(&file_path).map(|user: OpenidUser|{
|
||||||
if user.id == self.id {
|
if user.id == self.id {
|
||||||
self.to_owned().line_format()
|
self.to_owned().line_format()
|
||||||
} else {
|
} else {
|
||||||
user.line_format()
|
user.line_format()
|
||||||
}
|
}
|
||||||
}).collect();
|
}).collect();
|
||||||
let entries = Entries::<User>::new(&file_path);
|
let entries = Entries::<OpenidUser>::new(&file_path);
|
||||||
match entries.write(&new_entries) {
|
match entries.write(&new_entries) {
|
||||||
Ok(_) => Ok(true),
|
Ok(_) => Ok(true),
|
||||||
Err(e) => {
|
Err(e) => {
|
||||||
println!("Error data update '{}': {}", self.id, e);
|
println!("Error data update '{}': {}", self.id, e);
|
||||||
Err(anyhow!("No data updated").context("User update"))
|
Err(anyhow!("No data updated").context("OpenidUser update"))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@ -357,34 +336,25 @@ impl User {
|
|||||||
}
|
}
|
||||||
pub fn show(&self, sep: &str) {
|
pub fn show(&self, sep: &str) {
|
||||||
let content = if sep.is_empty() {
|
let content = if sep.is_empty() {
|
||||||
format!( "{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}",
|
format!( "{}\n{}\n{}\n{}\n{}\n{}\n{}\n{}",
|
||||||
self.id,
|
self.id,
|
||||||
self.name, self.fullname,
|
self.name,
|
||||||
|
self.application,
|
||||||
|
self.appkey,
|
||||||
|
self.userid,
|
||||||
self.description,
|
self.description,
|
||||||
self.email,
|
|
||||||
self.password,
|
|
||||||
self.otp_enabled,
|
|
||||||
self.otp_verified,
|
|
||||||
self.otp_base32,
|
|
||||||
self.otp_auth_url,
|
|
||||||
self.otp_defs,
|
|
||||||
self.roles,
|
|
||||||
self.created,
|
self.created,
|
||||||
self.lastaccess,
|
self.lastaccess,
|
||||||
self.status,
|
|
||||||
self.items,
|
|
||||||
self.isadmin
|
|
||||||
)
|
)
|
||||||
} else {
|
} else {
|
||||||
format!("{}",&self).replace(DISPLAY_SEPARATOR, sep)
|
format!("{}",self).replace(DISPLAY_SEPARATOR, sep)
|
||||||
};
|
};
|
||||||
println!("{}\n_____________________________",content);
|
println!("{}\n_____________________________",content);
|
||||||
}
|
}
|
||||||
pub async fn list(store: &UserStore, human: bool, show: bool, sep: &str) -> anyhow::Result<Vec<User>> {
|
pub async fn users_list( query_str: &str, store: &UserStore, human: bool, show: bool, sep: &str) -> anyhow::Result<Vec<OpenidUser>> {
|
||||||
let mut usrs: Vec<User> = Vec::new();
|
let mut usrs: Vec<OpenidUser> = Vec::new();
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
let query_str = format!("SELECT * FROM {}", USERS_TABLENAME);
|
|
||||||
let mut stream = sqlx::query(
|
let mut stream = sqlx::query(
|
||||||
&query_str
|
&query_str
|
||||||
)
|
)
|
||||||
@ -393,8 +363,6 @@ impl User {
|
|||||||
//})
|
//})
|
||||||
.fetch(pool);
|
.fetch(pool);
|
||||||
while let Some(row) = stream.try_next().await? {
|
while let Some(row) = stream.try_next().await? {
|
||||||
let str_status: String = row.try_get("status")?;
|
|
||||||
let status = UserStatus::from_str(&str_status);
|
|
||||||
let created = if human {
|
let created = if human {
|
||||||
let created: String = row.try_get("created")?;
|
let created: String = row.try_get("created")?;
|
||||||
str_date_from_timestamp(&created)
|
str_date_from_timestamp(&created)
|
||||||
@ -410,21 +378,12 @@ impl User {
|
|||||||
let user = Self{
|
let user = Self{
|
||||||
id: row.try_get("id")?,
|
id: row.try_get("id")?,
|
||||||
name: row.try_get("name")?,
|
name: row.try_get("name")?,
|
||||||
fullname: row.try_get("fullname")?,
|
application: row.try_get("application")?,
|
||||||
email: row.try_get("email")?,
|
appkey: row.try_get("appkey")?,
|
||||||
|
userid: row.try_get("userid")?,
|
||||||
description: row.try_get("description")?,
|
description: row.try_get("description")?,
|
||||||
password: row.try_get("password")?,
|
|
||||||
otp_enabled: row.try_get("otp_enabled")?,
|
|
||||||
otp_verified: row.try_get("otp_verified")?,
|
|
||||||
otp_base32: row.try_get("otp_base32")?,
|
|
||||||
otp_auth_url: row.try_get("otp_auth_url")?,
|
|
||||||
otp_defs: row.try_get("otp_defs")?,
|
|
||||||
roles: row.try_get("roles")?,
|
|
||||||
created,
|
created,
|
||||||
lastaccess,
|
lastaccess,
|
||||||
status,
|
|
||||||
items: row.try_get("items")?,
|
|
||||||
isadmin: row.try_get("isadmin")?,
|
|
||||||
};
|
};
|
||||||
if show { user.show(sep); }
|
if show { user.show(sep); }
|
||||||
usrs.push(user);
|
usrs.push(user);
|
||||||
@ -432,200 +391,106 @@ impl User {
|
|||||||
Ok(usrs)
|
Ok(usrs)
|
||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
let all: Vec<User> = Entries::new(&file_path).collect();
|
let all: Vec<OpenidUser> = Entries::new(&file_path).collect();
|
||||||
if show {
|
if show {
|
||||||
for user in all.to_owned() { if show { user.show(sep); } }
|
for user in all.to_owned() { if show { user.show(sep); } }
|
||||||
}
|
}
|
||||||
Ok(all)
|
Ok(all)
|
||||||
},
|
},
|
||||||
// UserStore::None => Err(anyhow!("No store set")).context("Users list"),
|
// UserStore::None => Err(anyhow!("No store set")).context("OpenidUsers list"),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
#[allow(dead_code)]
|
||||||
|
pub async fn list(store: &UserStore, human: bool, show: bool, sep: &str) -> anyhow::Result<Vec<OpenidUser>> {
|
||||||
|
OpenidUser::users_list(
|
||||||
|
&format!("SELECT * FROM {}", OPENID_USERS_TABLENAME),
|
||||||
|
store, human, show, sep
|
||||||
|
).await
|
||||||
|
}
|
||||||
|
pub async fn list_selection(field: &str, value: &str, store: &UserStore, human: bool, show: bool, sep: &str) -> anyhow::Result<Vec<OpenidUser>> {
|
||||||
|
OpenidUser::users_list(
|
||||||
|
&format!("SELECT * FROM {} WHERE {} = '{}'", OPENID_USERS_TABLENAME, &field, &value),
|
||||||
|
store, human, show, sep
|
||||||
|
).await
|
||||||
|
}
|
||||||
|
#[allow(dead_code)]
|
||||||
pub async fn count(store: &UserStore) -> anyhow::Result<i64> {
|
pub async fn count(store: &UserStore) -> anyhow::Result<i64> {
|
||||||
match store {
|
match store {
|
||||||
UserStore::Sql(pool) => {
|
UserStore::Sql(pool) => {
|
||||||
|
let query_str = format!("SELECT count(*) as total FROM {}", OPENID_USERS_TABLENAME);
|
||||||
let query_str = format!("SELECT count(*) as total FROM {}", USERS_TABLENAME);
|
|
||||||
let row = sqlx::query(
|
let row = sqlx::query(
|
||||||
&query_str
|
&query_str
|
||||||
)
|
)
|
||||||
.fetch_one(pool).await?;
|
.fetch_one(pool).await?;
|
||||||
|
|
||||||
let total: i64 = row.try_get("total")?;
|
let total: i64 = row.try_get("total")?;
|
||||||
Ok(total)
|
Ok(total)
|
||||||
},
|
},
|
||||||
UserStore::File(file_path) => {
|
UserStore::File(file_path) => {
|
||||||
let all: Vec<User> = Entries::new(&file_path).collect();
|
let all: Vec<OpenidUser> = Entries::new(&file_path).collect();
|
||||||
Ok(all.len() as i64)
|
Ok(all.len() as i64)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
fn line_format(self) -> String {
|
fn line_format(self) -> String {
|
||||||
format!( "{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}:{}",
|
format!( "{}:{}:{}:{}:{}:{}:{}:{}",
|
||||||
self.id,
|
self.id,
|
||||||
self.name, self.fullname,
|
self.name,
|
||||||
|
self.application,
|
||||||
|
self.appkey,
|
||||||
self.description,
|
self.description,
|
||||||
self.email,
|
self.userid,
|
||||||
self.password,
|
self.created,
|
||||||
self.otp_enabled,
|
self.lastaccess,
|
||||||
self.otp_verified,
|
|
||||||
self.otp_base32,
|
|
||||||
self.otp_auth_url,
|
|
||||||
self.otp_defs,
|
|
||||||
self.roles,
|
|
||||||
self.created, self.lastaccess,
|
|
||||||
self.status,
|
|
||||||
self.items,
|
|
||||||
self.isadmin
|
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
pub fn hash_items(items: &str) -> HashMap<String,String> {
|
/*
|
||||||
if items.is_empty() {
|
pub fn from_data(&mut self, user_data: OpenidUserData) {
|
||||||
HashMap::new()
|
|
||||||
} else {
|
|
||||||
serde_json::from_str(items).unwrap_or_else(|e|{
|
|
||||||
println!("Error to convert user items to json: {}",e);
|
|
||||||
HashMap::new()
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
pub fn items(&self) -> HashMap<String,String> {
|
|
||||||
Self::hash_items(&self.items)
|
|
||||||
}
|
|
||||||
pub fn json_items(items: HashMap<String,String>) -> String {
|
|
||||||
serde_json::to_string(&items).unwrap_or_else(|e|{
|
|
||||||
println!("Error to convert user items to string: {}",e);
|
|
||||||
String::from("")
|
|
||||||
})
|
|
||||||
}
|
|
||||||
pub fn from_data(&mut self, user_data: UserData) {
|
|
||||||
if !user_data.name.is_empty() {
|
if !user_data.name.is_empty() {
|
||||||
self.name = user_data.name.to_owned();
|
self.name = user_data.name.to_owned();
|
||||||
}
|
}
|
||||||
if !user_data.fullname.is_empty() {
|
if !user_data.application.is_empty() {
|
||||||
self.fullname = user_data.fullname.to_owned();
|
self.application = user_data.application.to_owned();
|
||||||
}
|
}
|
||||||
if !user_data.description.is_empty() {
|
if !user_data.description.is_empty() {
|
||||||
self.description = user_data.description.to_owned();
|
self.description = user_data.description.to_owned();
|
||||||
}
|
}
|
||||||
if !user_data.email.is_empty() {
|
|
||||||
self.email = user_data.email.to_owned();
|
|
||||||
}
|
|
||||||
if !user_data.otp_code.is_empty() {
|
|
||||||
self.otp_base32 = user_data.otp_code.to_owned();
|
|
||||||
}
|
|
||||||
if !user_data.otp_url.is_empty() {
|
|
||||||
self.otp_auth_url = user_data.otp_url.to_owned();
|
|
||||||
}
|
|
||||||
if !user_data.roles.is_empty() {
|
|
||||||
self.roles = user_data.roles.to_owned();
|
|
||||||
}
|
|
||||||
if !user_data.items.is_empty() {
|
|
||||||
let mut items_hash = self.items();
|
|
||||||
for (key,val) in user_data.items {
|
|
||||||
items_hash.insert(key,val);
|
|
||||||
}
|
|
||||||
self.items = Self::json_items(items_hash);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
pub fn disable_totp(&mut self) {
|
pub fn from_user(&mut self, new_user: OpenidUser) {
|
||||||
self.otp_base32 = String::from("");
|
|
||||||
self.otp_auth_url = String::from("");
|
|
||||||
self.otp_defs = String::from("");
|
|
||||||
self.otp_verified = false;
|
|
||||||
self.otp_enabled = false;
|
|
||||||
}
|
|
||||||
pub fn from_user(&mut self, new_user: User) {
|
|
||||||
if !new_user.name.is_empty() {
|
if !new_user.name.is_empty() {
|
||||||
self.name = new_user.name.to_owned();
|
self.name = new_user.name.to_owned();
|
||||||
}
|
}
|
||||||
if !new_user.fullname.is_empty() {
|
if !new_user.application.is_empty() {
|
||||||
self.fullname = new_user.fullname.to_owned();
|
self.application = new_user.application.to_owned();
|
||||||
}
|
}
|
||||||
if !new_user.description.is_empty() {
|
if !new_user.description.is_empty() {
|
||||||
self.description = new_user.description.to_owned();
|
self.description = new_user.description.to_owned();
|
||||||
}
|
}
|
||||||
if !new_user.email.is_empty() {
|
|
||||||
self.email = new_user.email.to_owned();
|
|
||||||
}
|
|
||||||
if !new_user.password.is_empty() {
|
|
||||||
self.password = new_user.password.to_owned();
|
|
||||||
}
|
|
||||||
if new_user.otp_enabled {
|
|
||||||
self.disable_totp();
|
|
||||||
} else {
|
|
||||||
if !new_user.otp_base32.is_empty() {
|
|
||||||
self.otp_base32 = new_user.otp_base32.to_owned();
|
|
||||||
}
|
|
||||||
if !new_user.otp_auth_url.is_empty() {
|
|
||||||
self.otp_auth_url = new_user.otp_auth_url.to_owned();
|
|
||||||
}
|
|
||||||
if !new_user.otp_defs.is_empty() {
|
|
||||||
self.otp_defs = new_user.otp_defs.to_owned();
|
|
||||||
}
|
|
||||||
self.otp_verified = new_user.otp_verified;
|
|
||||||
}
|
|
||||||
if !new_user.roles.is_empty() {
|
|
||||||
self.roles = new_user.roles.to_owned();
|
|
||||||
}
|
|
||||||
if !new_user.items.is_empty() {
|
|
||||||
self.items = new_user.items.to_owned();
|
|
||||||
}
|
|
||||||
if new_user.status != self.status {
|
|
||||||
self.status = new_user.status.to_owned();
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
pub fn session_data(&self) -> String {
|
pub fn session_data(&self) -> String {
|
||||||
format!("{}|{}|{}|{}|{}|{}|{}",
|
format!("{}|{}|{}|{}|{}",
|
||||||
&self.id,
|
&self.id,
|
||||||
&self.name,
|
&self.name,
|
||||||
&self.email,
|
&self.application,
|
||||||
&self.roles,
|
&self.appkey,
|
||||||
&self.items,
|
&self.userid
|
||||||
&self.isadmin,
|
|
||||||
&self.status
|
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
pub fn estimate_password(word: &str) -> String {
|
*/
|
||||||
match zxcvbn::zxcvbn(word, &[]) {
|
pub async fn sync_ids(userid: &str, open_ids: &str, store: &UserStore) {
|
||||||
Ok(estimate) => {
|
let openid_sel = OpenidUser::list_selection(
|
||||||
if let Some(feedback) = estimate.feedback() {
|
"userid", userid, store, true,false, "|"
|
||||||
let arr_suggestions: Vec<String> = feedback.suggestions().iter().map(|s| format!("{}",s)).collect();
|
).await.unwrap_or_else(|e| {
|
||||||
let suggestions = arr_suggestions.join("\n");
|
println!("Error list selection {}: {}", &userid, e);
|
||||||
if let Some(warning) = feedback.warning() {
|
Vec::new()
|
||||||
let warning = format!("{}", warning);
|
});
|
||||||
format!("{}|{}|{}",estimate.score(),suggestions,warning)
|
let new_open_ids: Vec<String> = open_ids.split(",").map(|s| s.to_string()).collect();
|
||||||
} else {
|
for itm in openid_sel {
|
||||||
format!("{}|{}|",estimate.score(),suggestions)
|
if new_open_ids.len() == 0 || ! new_open_ids.contains(&itm.appkey) {
|
||||||
}
|
let _res = OpenidUser::delete(itm.id, &store).await.unwrap_or_else(|e| {
|
||||||
} else {
|
println!("Error delete {}: {}",&itm.appkey,e);
|
||||||
format!("{}||",estimate.score())
|
false
|
||||||
}
|
});
|
||||||
},
|
|
||||||
Err(e) => {
|
|
||||||
println!("Error password strength estimator: {}", e);
|
|
||||||
String::from("-1|||")
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
pub fn password_score(word: &str) -> u8 {
|
|
||||||
match zxcvbn::zxcvbn(word, &[]) {
|
|
||||||
Ok(estimate) => {
|
|
||||||
estimate.score()
|
|
||||||
},
|
|
||||||
Err(e) => {
|
|
||||||
println!("Error password strength estimator: {}", e);
|
|
||||||
0
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#[allow(dead_code)]
|
|
||||||
pub fn has_auth_role(&self, auth_roles: Vec<String>) -> bool {
|
|
||||||
for role in auth_roles {
|
|
||||||
if self.roles.contains(&role) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
}
|
}
|
Loading…
Reference in New Issue
Block a user